{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T22:00:46Z","timestamp":1767996046541,"version":"3.49.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T00:00:00Z","timestamp":1718236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T00:00:00Z","timestamp":1718236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10207-024-00871-7","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T11:03:31Z","timestamp":1718276611000},"page":"2939-2949","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Email bombing attack detection and mitigation using machine learning"],"prefix":"10.1007","volume":"23","author":[{"given":"Sanjeev","family":"Shukla","sequence":"first","affiliation":[]},{"given":"Manoj","family":"Misra","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Varshney","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"key":"871_CR1","unstructured":"Internet\u00a0Security, C.: MMS-ISAC security primer-email bombs, 2018. https:\/\/www.cisecurity.org\/white-papers\/ms-isac-security-primer-emailbombs\/"},{"key":"871_CR2","unstructured":"Kuwahara, R.: How to survive an email bomb attack, 2022. https:\/\/paubox.com\/resources\/how-to-survive-an-email-bomb-attack\/"},{"key":"871_CR3","doi-asserted-by":"crossref","unstructured":"Li, Z., Liao, Q.: Captcha: Machine or human solvers? a game theoretical analysis. In: 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), 18\u201323 (2018)","DOI":"10.1109\/CSCloud\/EdgeCom.2018.00013"},{"key":"871_CR4","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10207-019-00470-x","volume":"19","author":"M Sheikh","year":"2020","unstructured":"Sheikh, M., Saracino, A., Martinelli, F., Marra, A., Mejri, M., Mejri, N.: Digital waste disposal: an automated framework for analysis of spam emails. Int. J. Inf. Secur. 19, 499\u2013522 (2020)","journal-title":"Int. J. Inf. Secur."},{"key":"871_CR5","doi-asserted-by":"crossref","unstructured":"Dev, J., Rader, E., Patil, S.: Why johnny can\u2019t unsubscribe: Barriers to stopping un-wanted email. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI \u201920, 1\u201312 (2020)","DOI":"10.1145\/3313831.3376165"},{"key":"871_CR6","doi-asserted-by":"crossref","unstructured":"Houle, R.C., Pandey: A layered approach to defending against list-linking email bombs. APWG Symposium on Electronic Crime Research (eCrime), IEEE, 1\u20139 (2018)","DOI":"10.1109\/ECRIME.2018.8376214"},{"key":"871_CR7","doi-asserted-by":"publisher","first-page":"100086","DOI":"10.1016\/j.hcc.2022.100086","volume":"2","author":"A Laha","year":"2022","unstructured":"Laha, A., Yasar, M.T., Cheng, Y.: Substop: an analysis on subscription email bombing attack and machine learning based mitigation. J. High-Confid. Comput. 2, 100086 (2022)","journal-title":"J. High-Confid. Comput."},{"key":"871_CR8","doi-asserted-by":"crossref","unstructured":"Schneider, M., Shulman, H., Sidis, A., Sidis, R., Waidner, M.: Diving into email bomb attack. In: 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 286\u2013293 (2020)","DOI":"10.1109\/DSN48063.2020.00045"},{"key":"871_CR9","doi-asserted-by":"crossref","unstructured":"Schneider, M., Shulman, H., Waidner, M.: Blocking email bombs with email glass. In: GLOBECOM 2020 - 2020 IEEE Global Communications Conference, Taipei, Taiwan, pp. 1\u20136 (2020)","DOI":"10.1109\/GLOBECOM42002.2020.9322348"},{"key":"871_CR10","doi-asserted-by":"crossref","unstructured":"Konno, K., Kitagawa, N., Yamai, N.: False positive detection in sender domain authentication by dmarc report analysis. In: 3rd Int. Conference on Information Science and System ICISS, pp. 38\u201341 (2020)","DOI":"10.1145\/3388176.3388217"},{"issue":"3","key":"871_CR11","doi-asserted-by":"publisher","first-page":"3184","DOI":"10.1109\/TNSM.2021.3065422","volume":"18","author":"S Maroofi","year":"2021","unstructured":"Maroofi, S., Korczynski, M., H\u00f6lzel, A., Duda, A.: Adoption of email anti-spoofing schemes: a large scale analysis. IEEE Trans. Netw. Serv. Manage. 18(3), 3184\u201396 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"871_CR12","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/978-3-031-25538-0_26","volume":"6","author":"S Shukla","year":"2023","unstructured":"Shukla, S., Misra, M., Varshney, G.: Forensic analysis and detection of spoofing based email attack using memory forensics and machine learning. Secur. Priv. Commun. Netw. 6, 491\u2013509 (2023)","journal-title":"Secur. Priv. Commun. Netw."},{"key":"871_CR13","doi-asserted-by":"crossref","unstructured":"Shukla, S., Misra, M., Varshneyy, G.: Identification of spoofed emails by applying email forensics and memory forensics. In: Prod. of ACM Digital Online, 10th Int. Conf. (ICCNS)., 109\u2013114 (2020)","DOI":"10.1145\/3442520.3442527"},{"key":"871_CR14","doi-asserted-by":"crossref","unstructured":"Che, H., Liu, Q., Zou, L., Yang, H., Zhou, D., Yu, F.: A content-based phishing email detection method,. In: IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2017, pp. 415\u2013422 (2017)","DOI":"10.1109\/QRS-C.2017.75"},{"key":"871_CR15","doi-asserted-by":"crossref","unstructured":"Sent\u00fcrk, S., Yerli, E., Sogukumar, I.: Email phishing detection and prevention by using data mining techniques. In: 2017 International Conference on Computer Science and Engineering (UBMK), IEEE, 2017, pp. 707\u2013712 (2017)","DOI":"10.1109\/UBMK.2017.8093510"},{"key":"871_CR16","doi-asserted-by":"crossref","unstructured":"Hassanpour, R., Dogdu, E., Choupani, R., Goker, O., Nazli, N.: Spam email detection using deep learning techniques. In: Proceedings of the ACMSE 2018 Conference, in: ACMSE \u201918, Association for Computing Machinery, New York, NY, USA, 2018, pp. 853\u2013858 (2018)","DOI":"10.1145\/3190645.3190719"},{"key":"871_CR17","doi-asserted-by":"crossref","unstructured":"Chen, Z., Tao, R., Wu, X., Wei, Z., luo, X.: Active learning for spam email classification. In: Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence, in: ACAI 2019,New York, NY, USA, pp. 457\u2013461 (2019)","DOI":"10.1145\/3377713.3377789"},{"key":"871_CR18","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.neucom.2019.01.078","volume":"337","author":"G Liu","year":"2019","unstructured":"Liu, G., Guo, J.: Bidirectional lstm with attention mechanism and convolutional layer for text classification. Neurocomputing 337, 325\u2013338 (2019)","journal-title":"Neurocomputing"},{"key":"871_CR19","doi-asserted-by":"crossref","unstructured":"AbdulNabi, I., Yaseen, Q.: Spam email detection using deep learning techniques. In: 12th International Conference on Ambient Systems, Networks and Technologies (ANT) \/ The 4th International Conference on Emerging Data and Industry 4.0 (EDI40), pp. 853\u2013858 (2021)","DOI":"10.1016\/j.procs.2021.03.107"},{"key":"871_CR20","unstructured":"MXTB: MXtoolbox,. https:\/\/mxtoolbox.com\/"},{"key":"871_CR21","doi-asserted-by":"crossref","unstructured":"Tudosi, A., Balan, D., Potorac, A.: New snort rule for detection and prevention of smtp e-mail bomb attacks. In: 16th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS (DAC), Suceava, Romania, 2022, pp. 78\u201384 (2022)","DOI":"10.1109\/DAS54948.2022.9786213"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00871-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00871-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00871-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T03:21:05Z","timestamp":1721013665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00871-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,13]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["871"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00871-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,13]]},"assertion":[{"value":"13 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}